Filtered by:

New cyber threat realities combined with the blazing speed of technological advances in today’s hyper-connected environments is driving architectural innovation in next-generation firewalls to deliver the highest levels of security while handling the digital network requirements. When it comes to security vs efficiency why choose? Fortinet is at the forefront of NGFW innovation, raising the bar for network security. Join us to learn more about the new FortiGate 6000F capabilities and architecture and how this changes the game especially for modern data centers and large enterprise environments where requirements for speed, security efficacy, and ease of management are paramount for these complex environments.
We also take a sneak peek into the largest FortiGate chassis the FG-7120F. In the last year, total data traffic in mobile networks has increased by 65% and operators are increasingly deploying networks to support higher throughputs. The FortiGate FG-7120F is uniquely suited for these demands, providing both interface density and unparalleled NGFW performance. The FG-7120F also extends functionality to include GPRS Tunneling Protocol (GTP) inspection at the highest levels of performance.

Today's Enterprises need to leverage SaaS services, IaaS efficiencies and endpoint apps and devices to be most competitive. This constantly evolving attack surface needs a security fabric that seamlessly grows & adapts with it.
The new security fabric expands from a single Enterprise location, to now cover cloud segments, remote sites and all users connecting into the fabric environment. Topics covered in this session will include integrations between the fabric and Public and Private cloud locations, remote sites (SD-WAN), SDN Connectors, Dynamic Policies, integrated UEBA tracking and central management.

In 2017, new cyberattacks like Wannacry burst onto the scene at the same time that existing ones such as Locky continued to evolve, demonstrating yet again the challenge a mature and constantly evolving threat landscape poses to organizations. In this session, we will discuss how the Fortinet Security Fabric generates and distributes dynamic threat intelligence--related to the very latest and most advanced threats--for integrated detection and response across the breadth of the organization. Join us to learn about Fortinet’s vision, key solution components, and most common customer use cases. This session provides the foundation for follow-on sessions covering the very latest in securing your email traffic, web applications, endpoints, and more.

Successful attacks continue on many organizations despite the continued investments in the latest technologies. To successfully defend our cyber assets whether from a Nation State Actor or an Organized Criminal companies need to understand both their adversary’s tradecraft as well as how to analyze and respond to their cyber weapons. Can the battle be won? Day 1 will consist of common attack tools and techniques used by attackers to identify your attack surface, breach your network, increase foothold and remain invisible. Day 2 will center around building threat intelligence and analysis capabilities within your organization which will include basic malware analysis, system forensics and threat information sharing concepts.
To help ensure participants gain as much as possible from this workshop it is highly recommended that they have experience in the following areas:
- General understanding of Networking
- Understanding of Windows and Linux
- Basic Understanding of security principals
Note: This is a very intensive workshop containing a lot of material and hands-on labs in a two-day span, so please be ready to “drink from the firehose”!
1: Attendees must be prepared with their laptops with VMWare Fusion or VMWare workstation to participate in the course. Attendees are required to have basic knowledge of VMWare and how to set up guest operating systems
2: The workshop requires attendees to participate in technical labs. The majority of this class will consist of technical labs
3: The attendees should not use work laptops since the workshop will contain live labs and may require the students to reinstall software.
4: Attendees agree to the outlines or accept the risks associated with not following them.

Enterprise data centers that have been rapidly adopting both private and public cloud infrastructure to transform their data centers are increasingly not just hybrid cloud, but multi-cloud as well. By using multiple IaaS providers (including AWS, Azure, Google, Oracle and IBM) as appropriate for different workloads, as well as leveraging SaaS-based cloud applications, organizations face a more complex and expanded attack surface. Thus security, privacy, and compliance remain top enterprise concerns when migrating to the cloud. This session will cover:
-Market trends and drivers around cloud computing and cloud adoption
-Cloud use cases and requirements for elastic scaling, micro-segmentation, and end-to-end segmentation
-Fortinet solutions for private cloud, public cloud, and SaaS
-Integration with third-party Fabric-Ready orchestration and automation solutions

The networks of small and mid-sized organizations are frequently lumped into a single SMB descriptor, regardless of their differences. However, the security discussion for a company of 50 is and should be very different than for a company of 500. In this session, we will discuss the differences in needs and capabilities for small and mid-sized organizations, as well as recent technology trends affecting them. We will include a variety of topics, including cloud, sandbox, and automation as it relates to S and MB. The Fortinet Security Fabric scales from small to Enterprise and offers different solutions to meet the distinct needs of these different organizations.

Join Steve Lewis, Senior Client Advisor at Service Leadership, Inc., the solution provider industry’s leading profitability benchmarking and consulting firm, for this compelling and actionable look at how your business model and Operational Maturity Level determine your profit potential and your ability to realize that profit. Audience members will come away with the ability to look at the economic drivers of their Predominant Business Model the same way the top performers do and to score five key operational methods using Service Leadership’s proven Operational Maturity Level approach.

Web application vulnerabilities remain a top point of entry that attackers use to compromise an organization’s IT infrastructure and the sensitive data it contains. The list of breaches directly attributed to these vulnerabilities grows every year, including the high-profile 2017 Equifax attack. Gartner highly recommends a Web Application Firewall (WAF) to protect organizations from threats that target known and unknown exploits.
In this session, we’ll first dive into the basics of Fortinet’s Fabric-integrated FortiWeb web application firewall and FortiADC application delivery controller to see how they’re used to defend against application layer attacks and deliver content securely. We’ll then move on to reveal and demo FortiWeb’s next generation, a sophisticated new feature that provides zero-day attack protection out-of-the-box, that virtually eliminates false positive detections.

As networks continue to evolve, organizations struggle to keep ahead. Too many solutions with varying management tools strain already overworked security teams. FortiManager provides a single-pane-of-glass for visibility across the entire Fortinet Security Fabric. FortiManager also lets you maintain control over your FortiGate, FortiSwitch, and FortiAP topologies through an easy-to-use and centralized management console. Learn how to easily control the deployment of security policies, FortiGuard content security updates, firmware revisions, and individual configurations for thousands of FortiOS-enabled devices.

With a dynamic attack surface due to the rise of IoT and cloud services, it's clear that no single technology will be able to stop every threat. To protect your enterprise against sophisticated threats, it is important to establish a comprehensive and cohesive security infrastructure that is broad enough to cover all attack vectors, powerful enough to run the latest security technologies, and automated to keep pace with fast-moving attacks. Attend this hands-on technical training workshop to learn how FortiMail, FortiClient, and FortiSandbox work together to protect your critical IT assets.